Two-Factor Decryption: A Better Way to Protect Data Security and Privacy.
Hui CuiRussell PauletSurya NepalXun YiButrus MbimbiPublished in: Comput. J. (2021)
Keyphrases
- data security
- encryption decryption
- data protection
- access control
- privacy requirements
- data privacy
- data centric
- data management
- privacy preserving data mining
- data confidentiality
- data integrity
- privacy protection
- information security
- privacy preserving
- sensitive data
- cloud computing
- data sets
- privacy concerns
- third party
- privacy preservation
- personal information
- database
- client server
- distributed systems
- data model
- databases